You are on page 1of 3

GRADE 11 DATA PROCESSING

DATABASE SECURITY

LESSON OBJECTIVES
• Define the terms “database security” and “database risk assessment”
• List and explain types/methods of data security control
• Explain the term “access control”
• List various access control methods in database security
• State the importance of securing data
• State the role of a database administrator in securing data

DEFINITION OF TERMS
• Data Security is the practice of keeping data protected from corruption and
unauthorized access. The focus behind data security is to ensure privacy while
protecting personal or corporate data.

• Data Risk Assessment is the process of determining/identifying the level of security


of stored data. Data risk assessment can also be defined as the process of
determining the safety of stored data.

METHODS OF DATA SECURITY CONTROL


• Access control:
It is the selective restriction of access to a place or other resource. The act of
accessing may mean consuming, entering, or using. Permission to access a resource
is called authorization.

• Auditing:
Database auditing involves observing a database so as to be aware of the actions of
database users for security purposes, for example, to ensure that those without the
permission to access information do not access it.

• Authentication:
It is the validation control that allows you to log into a system, email or blog account
etc. Once logged in, you have various privileges until logging out.

• Encryption:
This security mechanism uses mathematical scheme and algorithms to scramble
data into unreadable text. It can only be decoded or decrypted by the party that
possesses the associated key.
• Back up:
This is the process of making copy and archiving of computer data in the event of
data loss which is used to restore the original data.

• Password:
This is sequence of secret characters used to enable access to a file, program,
computer system or other resource.

ACCESS CONTROL
Access control is a mechanism put in place to allow users have different levels of access
to the database. Access control can also be defined as a process that allows users to have
resources that they are authorized to use.

Access Control Methods in Database Security:


• Username and Password
• Role-based Access control
• Mandatory Access Control
• Rule-Based Access Control
• Discretionary Access Control
• Organization-Based Access Control
• Responsibility Based Access Control
• Identity Based Access Control
• Authentication
• Biometric (face/voice/iris/fingerprint) Verification
• Physical control/Use of Lock/Burglary Proof/Metal Protector
• Personal Identification number (PIN)

IMPORTANCE OF SECURING DATA:


• Maintains data integrity
• Keeps sensitive data secure
• Protects data from internal/external corruption
• Protects against unauthorized data access
• Securing of data increases trust
• Guards against losses that might incur from data loss
• Enhances business reputation
ROLE OF A DATABASE ADMINISTRATOR IN DATABASE SECURITY
A database administrator (DBA) is a person responsible for the installation, configuration,
upgrade, administration, monitoring and maintenance of databases in an organization.
The role includes the development and design of database strategies, system monitoring
and improving database performance and capacity, and planning for future expansion
requirements. They may also plan, co-ordinate and implement security measures to
safeguard the database.

The roles of a DBA include:


• Maintaining users
• Backup database
• Managing data security and privacy
• Modifying/editing/updating the database structure
• Managing data integrity
• Monitoring and optimizing the performance of the database
• Database recovery
• Generation of reports/outputs
• Installs, Configures and Create Database
• Creating Users/ ID (Credentials)
• Deleting Users
• Installing and upgrading the database server and application tools.
• Allocating system storage and planning future storage requirements for the
database system
• Ensuring compliance with database vendor license agreement.
• Controlling and monitoring user access to the database.

You might also like